ESET® SECURITY MANAGEMENT CENTER

Enterprise-grade security management solution

110m+users worldwide

400k+business customers

200+countries & territories

13global R&D centers

ESET Security Management Center

provides real-time visibility for on-premise and off-premise endpoints as well as full reporting for ESET enterprise-grade solutions from a single pane of glass securely deployed on premise or in cloud.

Single-Click threat remediation

From the threats tab, you can create an exclusion, submit files for further analysis, or initiate a scan from a single click.

Dynamic and custom reporting

The ESET Security Management Center provides over 170 built in reports and allows you to create custom reports from over 1000 data points.

Fully-customizable notification system

The notification system features a full “what you see is what you get editor” where you will be able to fully configure notifications to be alerted on the exact information you want to be notified about.

Fully automated VDI support

A comprehensive hardware detection algorithm is used to determine the identity of the machine based on its hardware. This allows automated re-imaging and cloning of non-persistent hardware environments.

Use cases

PROBLEM

Organizations need to know when an unapproved software has been installed, then are required to remediate the software afterwards.

SOLUTION

Set up a dynamic group within ESET Security Management Center to look for a specific unwanted piece of software.

Create a notification to alert the IT department when a computer meets this criterion.

Set up a software uninstall task in the ESET Security Management Center to execute automatically when a computer meets the dynamic group criteria.

Set up a user notification that automatically pops up on the user’s screen indicating that they committed a software installation violation by installing the above software.

Flexible Install

ESET Security Management Center can be installed on Windows, Linux or via Virtual Appliance. After installation all management is done via a web-console, allowing easy access and management from any device or operating system.

Granular Policy Control

Organizations can set up multiple policies for the same computer or group and can nest policies for inherited permissions. In addition, organizations can configure policy settings as user-configurable, so you can lock down any number of settings from the end-users.

Stay on top of cybersecurity news

Online safety is one of the most significant challenges facing parents in the modern world. It is increasingly common for children of all ages to have their own phones, with 73% owning a mobile phone...